Skip to content

Commit 7dd41f9

Browse files
authored
SDKS-3990 Address missing error and warning exception logging. This change ensures these critical events are properly recorded. (#476)
1 parent 9ebfd7d commit 7dd41f9

File tree

7 files changed

+12
-12
lines changed

7 files changed

+12
-12
lines changed

forgerock-auth/src/main/java/org/forgerock/android/auth/CookieMarshaller.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ String marshal(@NonNull Cookie cookie) {
4040
outputStream.writeObject(new SerializableCookie(cookie));
4141
return Base64.encodeToString(baos.toByteArray(), Base64.DEFAULT);
4242
} catch (Exception e) {
43-
Logger.warn(TAG, "Failed to marshal the cookie to String.", e);
43+
Logger.warn(TAG, e, "Failed to marshal the cookie to String.");
4444
return null;
4545
}
4646
}
@@ -66,7 +66,7 @@ protected Class<?> resolveClass(ObjectStreamClass desc) throws ClassNotFoundExce
6666
};
6767
return ((SerializableCookie) objectInputStream.readObject()).getCookie();
6868
} catch (Exception e) {
69-
Logger.warn(TAG, "Failed to unmarshal the cookie from String.", e);
69+
Logger.warn(TAG, e, "Failed to unmarshal the cookie from String.");
7070
return null;
7171
}
7272
}

forgerock-auth/src/main/java/org/forgerock/android/auth/FRAuth.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ public static synchronized void start(Context context, @Nullable FROptions optio
5656
SessionManager sessionManager = ConfigHelper.getPersistedConfig(context, cachedOptions).getSessionManager();
5757
sessionManager.close();
5858
} catch (Exception e) {
59-
Logger.warn(TAG, "Failed to close the session manager", e);
59+
Logger.warn(TAG, e, "Failed to close the session manager");
6060
}
6161
}
6262
Config.getInstance().init(context, currentOptions);

forgerock-auth/src/main/java/org/forgerock/android/auth/devicebind/BiometricOnly.kt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ open class BiometricOnly : BiometricAuthenticator() {
4444
} catch (e: Exception) {
4545
//Failed because the key was generated with
4646
//KeyGenParameterSpec.Builder.setUserAuthenticationParameters
47-
Logger.warn(TAG, "Fallback to time-based key", e)
47+
Logger.warn(TAG, e, "Fallback to time-based key")
4848
biometricInterface.authenticate(authenticationCallback)
4949
}
5050
}

forgerock-auth/src/main/java/org/forgerock/android/auth/storage/CookiesStorage.kt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ class CookiesStorage(
4747
}
4848
}
4949
} catch (e: Throwable) {
50-
Logger.error(TAG, "Failed to migrate cookies", e)
50+
Logger.error(TAG, e, "Failed to migrate cookies")
5151
original.clearCookies()
5252
}
5353
}

forgerock-auth/src/main/java/org/forgerock/android/auth/storage/SSOTokenStorage.kt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ class SSOTokenStorage(
4747
original.clearToken()
4848
}
4949
} catch (e: Throwable) {
50-
Logger.error(TAG, "Failed to migrate SSO token", e)
50+
Logger.error(TAG, e, "Failed to migrate SSO token")
5151
original.clearToken()
5252
}
5353
}

forgerock-core/src/main/java/org/forgerock/android/auth/SecuredSharedPreferences.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -213,7 +213,7 @@ private String decrypt(@NonNull String data) {
213213
return new String(encryptor.decrypt(Base64.decode(data, Base64.DEFAULT)));
214214
} catch (Exception e) {
215215
//Failed to decrypt the data, reset the encryptor
216-
Logger.warn(TAG, "Failed to decrypt the data.", e);
216+
Logger.warn(TAG, e, "Failed to decrypt the data.");
217217
if (e instanceof CancellationException) {
218218
throw e;
219219
}

forgerock-core/src/main/java/org/forgerock/android/auth/encrypt/SecretKeyEncryptor.kt

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ class SecretKeyEncryptor(block: SecretKeyEncryptorConfig.() -> Unit = {}) : Susp
9696
override suspend fun encrypt(data: ByteArray): ByteArray = withContext(Dispatchers.Default) {
9797
lock.withLock {
9898
withRetry(byteArrayOf(), {
99-
Logger.error(TAG, "Failed to encrypt data, retrying...", it)
99+
Logger.error(TAG, it, "Failed to encrypt data, retrying...")
100100
keyStore.deleteEntry(config.keyAlias)
101101
}) {
102102
Logger.debug(TAG, "Encrypting data...")
@@ -142,7 +142,7 @@ class SecretKeyEncryptor(block: SecretKeyEncryptorConfig.() -> Unit = {}) : Susp
142142
)
143143
)
144144
} catch (e: Throwable) {
145-
Logger.error(TAG, "Failed to decrypt data", e)
145+
Logger.error(TAG, e, "Failed to decrypt data")
146146
if (config.throwWhenEncryptError) throw e
147147
byteArrayOf()
148148
}
@@ -180,7 +180,7 @@ class SecretKeyEncryptor(block: SecretKeyEncryptorConfig.() -> Unit = {}) : Susp
180180
try {
181181
SymmetricKey(generateAndroidKeyStoreSecretKey())
182182
} catch (e: Throwable) {
183-
Logger.warn(TAG, "falling back to asymmetric key", e)
183+
Logger.warn(TAG, e, "falling back to asymmetric key")
184184
//If failed to generate Android keystore secret key, generate file-based secret key
185185
generateEmbeddedSecretKey()
186186
}
@@ -295,7 +295,7 @@ class SecretKeyEncryptor(block: SecretKeyEncryptorConfig.() -> Unit = {}) : Susp
295295
keyPairGenerator.generateKeyPair()
296296
} catch (e: Exception) {
297297
//Retry again without strong box enabled, some platform may not response with StrongBoxUnavailableException
298-
Logger.warn(TAG, "Strong Box unavailable, recover without strong box", e)
298+
Logger.warn(TAG, e, "Strong Box unavailable, recover without strong box")
299299
keyGenParameterSpec.setIsStrongBoxBacked(false)
300300
keyPairGenerator.initialize(keyGenParameterSpec.build())
301301
keyPairGenerator.generateKeyPair()
@@ -386,7 +386,7 @@ class SecretKeyEncryptor(block: SecretKeyEncryptorConfig.() -> Unit = {}) : Susp
386386
return keyGenerator.generateKey()
387387
} catch (e: Exception) {
388388
//Retry again without strong box enabled, some platform may not response with StrongBoxUnavailableException
389-
Logger.warn(TAG, "Strong Box unavailable, recover without strong box", e)
389+
Logger.warn(TAG, e, "Strong Box unavailable, recover without strong box")
390390
specBuilder.setIsStrongBoxBacked(false)
391391
keyGenerator.init(specBuilder.build())
392392
return keyGenerator.generateKey()

0 commit comments

Comments
 (0)